Results 21 to 30 of about 142,803 (291)

An Operational Approach to Maritime Cyber Resilience [PDF]

open access: yesTransNav, 2021
As a result of the last decades development of technology and increased connectivity of maritime vessels, the need for maritime cyber security is undoubtedly present.
Erlend Erstad   +2 more
doaj   +1 more source

Protecting Cyber Physical Systems Using a Learned MAPE-K Model

open access: yesIEEE Access, 2019
Industry 4.0 leverages on cyber-physical systems (CPSs) that enable different physical sensors, actuators, and controllers to be interconnected via switches and cloud computing servers, forming complex online systems.
Ibrahim Elgendi   +3 more
doaj   +1 more source

Various types of cyber threats [PDF]

open access: yesSrpska Politička Misao
Security of the Internet and online communication has become an essential challenge in contemporary world. Paper discusses different types of cyber threats: cyber-attack, cyber terrorism and cybercrime.
Luknar Ivana, Jovanović Filip
doaj   +1 more source

Proactive threat detection for connected cars using recursive Bayesian estimation [PDF]

open access: yes, 2017
Upcoming disruptive technologies around autonomous driving of connected cars have not yet been matched with appropriate security by design principles and lack approaches to incorporate proactive preventative measures in the wake of increased cyber ...
al-Khateeb, Haider   +4 more
core   +3 more sources

Personal HealthCare of Things: A novel paradigm and futuristic approach

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta   +5 more
wiley   +1 more source

Possibilities of modelling the impact of cyber threats in cyber risk insurance

open access: yesMATEC Web of Conferences, 2018
In the last few years, we could see that a lot of world organizations are contested by different ways, which we are called as cyber threats or cyber risks.
Pavlik Lukas
doaj   +1 more source

Cyberthreats on Implantable Medical Devices

open access: yesJournal of Information Security and Cybercrimes Research, 2021
The significant and rapid technological development in the field of medical care, and Implanted Medical Device, clearly lead to improve the quality of care and effectiveness of treatment for numerous diseases that were previously difficult to be ...
Mohammed N. A. Sabra
doaj   +1 more source

Navigating Cyber Threats

open access: yesARO-The Scientific Journal of Koya University
The high-speed development of Fifth Generation technologies announces a new era for the internet of things (IoT), distinguished by high-rate connectivity, speed, and low latency.
Umed H. Jader   +2 more
doaj   +1 more source

Aspects of Digital Forensics in South Africa [PDF]

open access: yes, 2016
This paper explores the issues facing digital forensics in South Africa. It examines particular cyber threats and cyber threat levels for South Africa and the challenges in addressing the cybercrimes in the country through digital forensics.
Irons, Alastair, Ophoff, Jacques
core   +2 more sources

Cyber Threat Intelligence : Challenges and Opportunities

open access: yes, 2018
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy